Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 14:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
OxygenU.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
OxygenU.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
OxygenU.exe
-
Size
2.5MB
-
MD5
0e99ebc3be98524080cf2276d40fe5a8
-
SHA1
4eb977a1bf92196d68ce572260122b94bad060e3
-
SHA256
0687b4eb1654cb8bd7f42c37af6ec2fdfe50a696956be2aeb2bf04d84dc29252
-
SHA512
35a272330aa1a262e5e7cfd5c3cd532c96611c1eef5c868de8a940fd53c287ded51b4828cf39d3b2be53565c2768bd48025440e1c068fe6431cabe31d27525b5
-
SSDEEP
49152:WvCbY8rkxYOPo4gtUUxJerbY8zBkqXfd+/9ADqanUUh:KCbY8rLOAmUxJerbY8zBkqXf0FhWf
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OxygenU.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 OxygenU.exe